Protect Your Windows Network: From Perimeter to Data

Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore

Oh, the things a bad guy can do if he can lay his hands on your computer! Here's a sampling, going from Stone Age to Space Age:

Always make sure that a computer is physically protected in a way that's consistent with its valueand remember that the value of a computer includes not only the value of the hardware itself, but the value of the data on it, and the value of the access to your network that a bad guy could gain. At a minimum, business-critical computers like domain controllers, database servers, and print/file servers should always be in a locked room that only people charged with administration and maintenance can access. But you may want to consider protecting other computers as well, and potentially using additional protective measures.

If you travel with a laptop, it's absolutely critical that you protect it. The same features that make laptops great to travel withsmall size , light weight, and so forthalso make them easy to steal. There are a variety of locks and alarms available for laptops, and some models let you remove the hard drive and carry it with you. You also can use features like the Encrypting File System in Microsoft Windows 2000 to mitigate the damage if someone succeeded in stealing the computer. But the only way you can know with 100 percent certainty that your data is safe and the hardware hasn't been tampered with is to keep the laptop on your person at all times while traveling.

Категории